Privacy security in control systems

来源 :中国科学:信息科学(英文版) | 被引量 : 0次 | 上传用户:TCH376854850
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Privacy issues in control systems are getting more and more attention from both industry and research.In recent years,information technology and artificial intelligence technol-ogy are being increasingly employed in emerging applica-tions such as the Internet-of-Things[1],cloud-based con-trol systems,smart buildings,autonomous vehicles,and 5G networks.
其他文献
Dear editor,Recently, the satellite-integrated Internet of Things(S-IoT)has supported many emergent IoT applications [1], such as smart agriculture, remote healthcare, and environmental monitoring [2]
期刊
The Internet of Things has created an increasing demand for giant magnetoresistive (GMR)sensor owing to its high sensitivity,low power-consumption and small size.A full Wheatstone bridge GMR sensor is fabricated on 6-inch wafers with an annealing process
Dear editor,rnFault-tolerant tracking control has recently become an area of research interest,in which fault detection,fault-tolerant control (FTC),and tracking-control techniques are inte-grated[1,2].It is noteworthy that disturbance is a criti-cal fact
期刊
Graph convolutional networks (GCNs) have been applied successfully in social networks and recommendation systems to analyze graph data.Unlike conventional neural networks,GCNs introduce an aggregation phase,which is both computation-and memory-intensive.T
Dear editor,rnMany complicated real-world systems can be considered as complex networks to analyze their macroscopic properties,e.g.,the Internet,power grids,and communication net-works[1].Recently,studies have found that many real-world networks are coup
期刊
Dear editor,rnThe fractional Fourier transform (FRFT) was proposed by Wiener in 1929.As an important and powerful analyzing tool for time-frequency analysis,the FRFT has been ap-plied in a lot of fields[1,2]such as signal processing,op-tics,radar,and quan
期刊
Dear editor,rnThe study of nonlinear time-delay systems made great progress in the past few decades[1]and some effective meth-ods were presented for special systems such as the approxi-mate linear method,sum of squares decomposition method,and nonlinear m
期刊
Dear editor,rnIn recent years,we have witnessed a rapid development of the side-channel attacks,which deviate from the tradi-tional block-box model and exploit the leakages of crypto-graphic devices.Among those attacks,the so-called differen-tial power an
期刊
Dear editor,rnOrthogonal frequency division multiplexing (OFDM) has been adopted in new radio (NR)[1],and multiple-port de-modulation reference signal (DMRS) has been designed to achieve channel estimation.In NR,two ports of DMRS share the same frequency
期刊
Dear editor,rnTo maintain the confidentiality of the sensitive data,users tend to encrypt their data under an associated access pol-icy (or attributes) beforeoutsourcing them to the cloud.In the traditional access control model via cryptographic approache
期刊